US20140298479A1 - Secure data transfer for chat systems - Google Patents

Secure data transfer for chat systems Download PDF

Info

Publication number
US20140298479A1
US20140298479A1 US14/243,672 US201414243672A US2014298479A1 US 20140298479 A1 US20140298479 A1 US 20140298479A1 US 201414243672 A US201414243672 A US 201414243672A US 2014298479 A1 US2014298479 A1 US 2014298479A1
Authority
US
United States
Prior art keywords
secure data
user
chat
data transfer
chat session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/243,672
Inventor
Adam Stass
Dustin Yu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alive Technologies Inc
Original Assignee
AYU Tech Solutions LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by AYU Tech Solutions LLC filed Critical AYU Tech Solutions LLC
Priority to US14/243,672 priority Critical patent/US20140298479A1/en
Assigned to AYU TECHNOLOGY SOLUTIONS LLC reassignment AYU TECHNOLOGY SOLUTIONS LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: STASS, ADAM, YU, DUSTIN
Publication of US20140298479A1 publication Critical patent/US20140298479A1/en
Assigned to AYU TECHNOLOGY SOLUTIONS, LLC reassignment AYU TECHNOLOGY SOLUTIONS, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: STASS, ADAM
Assigned to ALIVE TECHNOLOGIES, INC. reassignment ALIVE TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AYU TECHNOLOGY SOLUTIONS LLC
Assigned to ALIVE TECHNOLOGIES, INC. reassignment ALIVE TECHNOLOGIES, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALIVE5, INC.
Assigned to ALIVE5, INC. reassignment ALIVE5, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE NAME OF ASSIGNEE PREVIOUSLY RECORDED ON REEL 047415 FRAME 0743. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT. Assignors: AYU TECHNOLOGY SOLUTIONS LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services

Definitions

  • Live support software also known as live chat or online chat
  • live support services can be used to exchange almost any type of information
  • caution must be exercised when exchanging confidential information using conventional chat systems because of the unsecured nature of the exchange. Accordingly, it is desirable to provide a system that can provide greater security when transfer and/or exchanging confidential or private information using live support software.
  • the methods and systems disclosed herein pertain to receiving and/or sending securing data using live support software (live chat).
  • two or more users are engaged in a live chat session, such as a customer and a support agent.
  • the two or more users can be exchanging text in real-time in a live chat session (synchronous live conversation).
  • one of the users e.g., the customer
  • the activation of the secure data transfer feature can be performed, for example, by clicking on a “lock” icon on the chat window during the chat session.
  • a separate, embedded text area can be presented (e.g., separate from the chat text area) to the user (e.g., customer).
  • the user can enter confidential or other private information (e.g., password, credit card information, etc.).
  • the secure data transfer can be performed in parallel with the open chat session between the users.
  • the user that is transmitting confidential information can click submit and the confidential information can be stored in a temporary “cache” which is in “memory” (e.g., not hard disk) on a server associated with the live chat session.
  • the confidential information can be “masked” (e.g., entirely hidden) from the user transferring the information (e.g., the customer), but remain fully visible in the chat window of the user receiving the information (e.g., the agent).
  • the chat transcript can be saved (e.g., in one or more databases), but the confidential information that was exchanged during the chat session is located and deleted from “cache”, so it will be not be saved in the database(s).
  • a trace can be provided that identifies that a secure data transfer was performed. For example, one of the users (e.g., the agent) can see the exchanged confidential information until they close the chat box. If a chat report is run, however, only a “flag” indicates that there was a secure data transfer. None about the exchanged information is available.
  • FIG. 1 illustrates an exemplary screenshot of a live chat session.
  • FIG. 2 illustrates an exemplary screenshot of a live chat session, in which a secure data transfer has been initiated.
  • FIGS. 3A and 3B illustrate exemplary screenshots from the perspective of a user transferring confidential information (e.g., a customer) and a user receiving confidential information (e.g., an operator or customer service agent).
  • a user transferring confidential information (e.g., a customer) and a user receiving confidential information (e.g., an operator or customer service agent).
  • FIG. 4 illustrates an exemplary screenshot of a live chat transcript after the chat session has ended, wherein the secure data transfer information is no longer saved or displayed.
  • the terms “a”, “an” and “at least one” encompass one or more of the specified element. That is, if two of a particular element are present, one of these elements is also present and thus “an” element is present.
  • the terms “a plurality of” and “plural” mean two or more of the specified element.
  • the term “and/or” used between the last two of a list of elements means any one or more of the listed elements.
  • the phrase “A, B, and/or C” means “A,” “B,” “C,” “A and B,” “A and C,” “B and C” or “A, B and C.”
  • the secure data transfer procedures disclosed herein allow one or more users to exchange confidential and/or private information with another user during a chat session.
  • two or more users are engaged in a live chat session, such as a customer and a support agent.
  • a chat session has been initiated from a website (i.e., Bob's Plumbing Website) and the two or more users (e.g., a customer and customer service agent) are exchanging text in real-time in a live chat session.
  • a website i.e., Bob's Plumbing Website
  • the two or more users e.g., a customer and customer service agent
  • the users can activate a “Secure Data Transfer” feature.
  • the secure data transfer feature can be activated by clicking on an icon, such as the “lock” icon located at a lower left side of the chat window during the chat session.
  • an icon such as the “lock” icon located at a lower left side of the chat window during the chat session.
  • secure data transfer can only be initiated during a live chat conversation, where there is a clear start and end of the chat session.
  • a separate, embedded text area can be presented separate from the chat text area to the user.
  • the user e.g., the customer
  • confidential or other private information e.g., password, credit card information, etc.
  • the secure data transfer can be performed in parallel with the open chat session between the users.
  • the user that is transmitting confidential information can click submit and the confidential information can be stored in a temporary “cache” which is in “memory” (e.g., not hard disk) on a server associated with the live chat session.
  • the confidential information can be “masked” (e.g., entirely hidden) from the user that transferred the information (e.g., the customer), but remain fully visible in the chat window of the user receiving the information (e.g., the agent). This is illustrated, for example, in FIG. 3 . As shown in FIG. 3 , the user that exchanged the confidential information (e.g., the customer) only sees the indication that secure data was transferred, while the user that received the secure data can see the secured date in its entirety.
  • the confidential information e.g., the customer
  • the chat transcript can be saved (e.g., in one or more databases), but the confidential information that was exchanged during the chat session is located and deleted from “cache”, so it will be not be saved in the database(s). If the stored data is later viewed, for example by an administrator or operator, the chat session will only reflect that secure data was transferred—it will not identify the content of that data. Accordingly, in this manner, confidential information is only stored while the chat session in progress and the confidential information is deleted or otherwise destroyed after the chat session has ended.
  • the secure data that is transferred by a user can comprise any confidential information that the user would want to be protected in a secure manner.
  • the secure data can comprise credit card information or other financial information associated with a billing or sales event.
  • the secure data transfers can include health care information such as personal medical history information of the user.
  • the confidential information can include financial information associated with the user, such as information relating to banking or retirement accounts. It should be understood that these are only examples of the type of confidential information that can be exchanged using the systems and methods disclosed herein.
  • Such secure data transfers can be initiated any time one or more users would like to restrict later access to the

Abstract

The methods and systems disclosed herein pertain to secure data transfers during live chat sessions. At the conclusion of the chat session, any confidential information exchanged using the secure data transfer can be destroyed to maintain the confidentiality and/or privacy of the content of that information.

Description

    CROSS REFERENCE TO RELATED APPLICATION
  • This application claims the benefit of U.S. Provisional Application No. 61/807,652 filed Apr. 2, 2013, which is herein incorporated by reference in its entirety.
  • BACKGROUND
  • Live support software, also known as live chat or online chat, is used by many businesses to receive and respond to text communications from users. Although live support services can be used to exchange almost any type of information, caution must be exercised when exchanging confidential information using conventional chat systems because of the unsecured nature of the exchange. Accordingly, it is desirable to provide a system that can provide greater security when transfer and/or exchanging confidential or private information using live support software.
  • SUMMARY
  • The methods and systems disclosed herein pertain to receiving and/or sending securing data using live support software (live chat).
  • In one representative embodiment, two or more users are engaged in a live chat session, such as a customer and a support agent. The two or more users can be exchanging text in real-time in a live chat session (synchronous live conversation). To provide for a secure exchange of data, one of the users (e.g., the customer) can activate a “Secure Data Transfer” feature. The activation of the secure data transfer feature can be performed, for example, by clicking on a “lock” icon on the chat window during the chat session.
  • After the secure data transfer feature is activated, a separate, embedded text area can be presented (e.g., separate from the chat text area) to the user (e.g., customer). The user can enter confidential or other private information (e.g., password, credit card information, etc.). The secure data transfer can be performed in parallel with the open chat session between the users. The user that is transmitting confidential information can click submit and the confidential information can be stored in a temporary “cache” which is in “memory” (e.g., not hard disk) on a server associated with the live chat session.
  • In some embodiments, the confidential information can be “masked” (e.g., entirely hidden) from the user transferring the information (e.g., the customer), but remain fully visible in the chat window of the user receiving the information (e.g., the agent).
  • After the chat session is ended, the chat transcript can be saved (e.g., in one or more databases), but the confidential information that was exchanged during the chat session is located and deleted from “cache”, so it will be not be saved in the database(s).
  • Accordingly, in this manner, confidential information is only stored while the chat session in progress and the confidential information is deleted or otherwise destroyed after the chat session has ended.
  • In some embodiments, a trace can be provided that identifies that a secure data transfer was performed. For example, one of the users (e.g., the agent) can see the exchanged confidential information until they close the chat box. If a chat report is run, however, only a “flag” indicates that there was a secure data transfer. Nothing about the exchanged information is available.
  • The foregoing and other objects, features, and advantages of the invention will become more apparent from the following detailed description, which proceeds with reference to the accompanying figures.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates an exemplary screenshot of a live chat session.
  • FIG. 2 illustrates an exemplary screenshot of a live chat session, in which a secure data transfer has been initiated.
  • FIGS. 3A and 3B illustrate exemplary screenshots from the perspective of a user transferring confidential information (e.g., a customer) and a user receiving confidential information (e.g., an operator or customer service agent).
  • FIG. 4 illustrates an exemplary screenshot of a live chat transcript after the chat session has ended, wherein the secure data transfer information is no longer saved or displayed.
  • DETAILED DESCRIPTION
  • For purposes of this description, certain aspects, advantages, and novel features of the embodiments of this disclosure are described herein. The disclosed methods, apparatuses, and systems should not be construed as limiting in any way. Instead, the present disclosure is directed toward all novel and nonobvious features and aspects of the various disclosed embodiments, alone and in various combinations and sub-combinations with one another. The methods, apparatuses, and systems are not limited to any specific aspect or feature or combination thereof, nor do the disclosed embodiments require that any one or more specific advantages be present or problems be solved.
  • Although the operations of some of the disclosed methods are described in a particular, sequential order for convenient presentation, it should be understood that this manner of description encompasses rearrangement, unless a particular ordering is required by specific language. For example, operations described sequentially may in some cases be rearranged or performed concurrently. Moreover, for the sake of simplicity, the attached figures may not show the various ways in which the disclosed methods can be used in conjunction with other methods. Additionally, the description sometimes uses terms like “determine” and “provide” to describe the disclosed methods. These terms are high-level abstractions of the actual operations that are performed. The actual operations that correspond to these terms may vary depending on the particular implementation and are readily discernible by one of ordinary skill in the art.
  • As used herein, the terms “a”, “an” and “at least one” encompass one or more of the specified element. That is, if two of a particular element are present, one of these elements is also present and thus “an” element is present. The terms “a plurality of” and “plural” mean two or more of the specified element. As used herein, the term “and/or” used between the last two of a list of elements means any one or more of the listed elements. For example, the phrase “A, B, and/or C” means “A,” “B,” “C,” “A and B,” “A and C,” “B and C” or “A, B and C.”
  • The secure data transfer procedures disclosed herein allow one or more users to exchange confidential and/or private information with another user during a chat session. In one representative embodiment, two or more users are engaged in a live chat session, such as a customer and a support agent. As shown in FIG. 1, a chat session has been initiated from a website (i.e., Bob's Plumbing Website) and the two or more users (e.g., a customer and customer service agent) are exchanging text in real-time in a live chat session. To provide for a secure exchange of data, one of the users (e.g., the customer) can activate a “Secure Data Transfer” feature. As shown in FIG. 1, the secure data transfer feature can be activated by clicking on an icon, such as the “lock” icon located at a lower left side of the chat window during the chat session. Preferably secure data transfer can only be initiated during a live chat conversation, where there is a clear start and end of the chat session.
  • As shown in FIG. 2, after the secure data transfer feature is activated, a separate, embedded text area can be presented separate from the chat text area to the user. The user (e.g., the customer) can enter confidential or other private information (e.g., password, credit card information, etc.). The secure data transfer can be performed in parallel with the open chat session between the users. The user that is transmitting confidential information can click submit and the confidential information can be stored in a temporary “cache” which is in “memory” (e.g., not hard disk) on a server associated with the live chat session.
  • In some embodiments, once the confidential information has been sent by the user, it can be “masked” (e.g., entirely hidden) from the user that transferred the information (e.g., the customer), but remain fully visible in the chat window of the user receiving the information (e.g., the agent). This is illustrated, for example, in FIG. 3. As shown in FIG. 3, the user that exchanged the confidential information (e.g., the customer) only sees the indication that secure data was transferred, while the user that received the secure data can see the secured date in its entirety.
  • As shown in FIG. 4, after the chat session is ended, the chat transcript can be saved (e.g., in one or more databases), but the confidential information that was exchanged during the chat session is located and deleted from “cache”, so it will be not be saved in the database(s). If the stored data is later viewed, for example by an administrator or operator, the chat session will only reflect that secure data was transferred—it will not identify the content of that data. Accordingly, in this manner, confidential information is only stored while the chat session in progress and the confidential information is deleted or otherwise destroyed after the chat session has ended.
  • The secure data that is transferred by a user can comprise any confidential information that the user would want to be protected in a secure manner. For example, for online businesses the secure data can comprise credit card information or other financial information associated with a billing or sales event. In other embodiments, the secure data transfers can include health care information such as personal medical history information of the user. In still other embodiments, the confidential information can include financial information associated with the user, such as information relating to banking or retirement accounts. It should be understood that these are only examples of the type of confidential information that can be exchanged using the systems and methods disclosed herein. Such secure data transfers can be initiated any time one or more users would like to restrict later access to the
  • In view of the many possible embodiments to which the principles of the disclosed invention may be applied, it should be recognized that the illustrated embodiments are only preferred examples of the invention and should not be taken as limiting the scope of the invention. Rather, the scope of the invention is defined by the following claims. We therefore claim as our invention all that comes within the scope and spirit of these claims.

Claims (5)

We claim:
1. A method of securely transferring data during a chat session, comprising:
receiving a chat request to initiate a chat session from a user;
initiating the chat session in response to the chat request by opening a chat window;
receiving a transfer request to initiate a secure data transfer from the user;
initiating the secure data transfer in response to the transfer request by opening a secure data transfer window;
receiving secure data from the user via the secure data transfer window and temporarily storing the secure data;
ending the chat session; and
after ending the chat session, destroying the stored secure data that was transferred from to the user via the secure data transfer widow.
2. The method of claim 1, wherein the secure data received from the user comprises credit card information of the user.
3. The method of claim 1, wherein the secure data received from the user comprises personal medical information about the user.
4. The method of claim 1, wherein the secure data received from the user comprises confidential identifying information about the user.
5. The method of claim 4, wherein the secure data comprises one or more social security numbers.
US14/243,672 2013-04-02 2014-04-02 Secure data transfer for chat systems Abandoned US20140298479A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/243,672 US20140298479A1 (en) 2013-04-02 2014-04-02 Secure data transfer for chat systems

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361807652P 2013-04-02 2013-04-02
US14/243,672 US20140298479A1 (en) 2013-04-02 2014-04-02 Secure data transfer for chat systems

Publications (1)

Publication Number Publication Date
US20140298479A1 true US20140298479A1 (en) 2014-10-02

Family

ID=51622228

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/243,672 Abandoned US20140298479A1 (en) 2013-04-02 2014-04-02 Secure data transfer for chat systems

Country Status (1)

Country Link
US (1) US20140298479A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160380927A1 (en) * 2015-06-27 2016-12-29 Mcafee, Inc. Protection of sensitive chat data
US20170344280A1 (en) * 2016-05-25 2017-11-30 International Business Machines Corporation Targeted secure data overwrite
WO2019095043A1 (en) * 2017-11-14 2019-05-23 Blackberry Limited Electronic device including display and method of encrypting and decrypting information
US10382620B1 (en) 2018-08-03 2019-08-13 International Business Machines Corporation Protecting confidential conversations on devices
US10944562B2 (en) 2018-06-03 2021-03-09 Apple Inc. Authenticating a messaging program session

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040230798A1 (en) * 2003-03-05 2004-11-18 Gerrit Bleumer Method for securely exchanging data
US20070156836A1 (en) * 2006-01-05 2007-07-05 Lenovo(Singapore) Pte. Ltd. System and method for electronic chat identity validation
US20070300306A1 (en) * 2006-06-21 2007-12-27 Basit Hussain Method and system for providing granular data access control for server-client applications
US20080021816A1 (en) * 2000-06-15 2008-01-24 Nextcard, Llc Integrating Live Chat Into an Online Credit Card Application
US20120209941A1 (en) * 2009-12-14 2012-08-16 Fujitsu Limited Communication apparatus, and apparatus and method for controlling collection of statistical data
US8458487B1 (en) * 2010-03-03 2013-06-04 Liaison Technologies, Inc. System and methods for format preserving tokenization of sensitive information
US20140058939A1 (en) * 2012-08-24 2014-02-27 Ebay Inc. Method and apparatus for processing payment transactions from a chat application integrated with a payment application that leverages social features from the chat application
US8719591B1 (en) * 2004-05-14 2014-05-06 Radix Holdings, Llc Secure data entry
US20140280982A1 (en) * 2013-03-14 2014-09-18 Vonage Network Llc Secure transmission of media during a communication session

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080021816A1 (en) * 2000-06-15 2008-01-24 Nextcard, Llc Integrating Live Chat Into an Online Credit Card Application
US20040230798A1 (en) * 2003-03-05 2004-11-18 Gerrit Bleumer Method for securely exchanging data
US8719591B1 (en) * 2004-05-14 2014-05-06 Radix Holdings, Llc Secure data entry
US20070156836A1 (en) * 2006-01-05 2007-07-05 Lenovo(Singapore) Pte. Ltd. System and method for electronic chat identity validation
US20070300306A1 (en) * 2006-06-21 2007-12-27 Basit Hussain Method and system for providing granular data access control for server-client applications
US20120209941A1 (en) * 2009-12-14 2012-08-16 Fujitsu Limited Communication apparatus, and apparatus and method for controlling collection of statistical data
US8458487B1 (en) * 2010-03-03 2013-06-04 Liaison Technologies, Inc. System and methods for format preserving tokenization of sensitive information
US20140058939A1 (en) * 2012-08-24 2014-02-27 Ebay Inc. Method and apparatus for processing payment transactions from a chat application integrated with a payment application that leverages social features from the chat application
US20140280982A1 (en) * 2013-03-14 2014-09-18 Vonage Network Llc Secure transmission of media during a communication session

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10834027B2 (en) * 2015-06-27 2020-11-10 Mcafee, Llc Protection of sensitive chat data
WO2017003581A1 (en) 2015-06-27 2017-01-05 Mcafee, Inc. Protection of sensitive chat data
CN107873096A (en) * 2015-06-27 2018-04-03 迈克菲有限责任公司 The protection of sensitive chat data
EP3314858A4 (en) * 2015-06-27 2019-01-23 McAfee, LLC Protection of sensitive chat data
US11171895B2 (en) 2015-06-27 2021-11-09 Mcafee, Llc Protection of sensitive chat data
US20160380927A1 (en) * 2015-06-27 2016-12-29 Mcafee, Inc. Protection of sensitive chat data
US20170344280A1 (en) * 2016-05-25 2017-11-30 International Business Machines Corporation Targeted secure data overwrite
US11188270B2 (en) * 2016-05-25 2021-11-30 International Business Machines Corporation Targeted secure data overwrite
US10846412B2 (en) 2017-11-14 2020-11-24 Blackberry Limited Electronic device including display and method of encrypting and decrypting information
CN111344707A (en) * 2017-11-14 2020-06-26 黑莓有限公司 Electronic device comprising a display and method of encrypting and decrypting information
WO2019095043A1 (en) * 2017-11-14 2019-05-23 Blackberry Limited Electronic device including display and method of encrypting and decrypting information
US10944562B2 (en) 2018-06-03 2021-03-09 Apple Inc. Authenticating a messaging program session
US11870902B2 (en) 2018-06-03 2024-01-09 Apple Inc. Authenticating a messaging program session
US10382620B1 (en) 2018-08-03 2019-08-13 International Business Machines Corporation Protecting confidential conversations on devices

Similar Documents

Publication Publication Date Title
US11477180B2 (en) Differential client-side encryption of information originating from a client
US11665147B2 (en) Blockchain systems and methods for user authentication
US20140298479A1 (en) Secure data transfer for chat systems
US20150058972A1 (en) Method And Apparatus For Accessing An Application Program
CA2903749C (en) Apparatus, system and method for secure data exchange
US20150269331A1 (en) System and method for securing, and providing secured access to encrypted global identities embedded in a qr code
ES2904538T3 (en) System and method for substituting common identification data
US10387671B2 (en) Private data management system and method therefor
US9225694B1 (en) Mobile application secure data exchange
US10404460B2 (en) Data management method, computer readable recording medium thereof, user client for executing data management method, and security policy server
US11314873B2 (en) Storage system
US20150288770A1 (en) System and Computer Implemented Method of Personal Monitoring
US8856175B2 (en) Method and computer-readable media for managing business transactions
KR20190024222A (en) Method for scrapping user information and application system thereof
JP2019149120A (en) System, method, and program of temporarily making authentication unnecessary
TH142214A (en) The device masks the user's information on the information card and how it does so.

Legal Events

Date Code Title Description
AS Assignment

Owner name: AYU TECHNOLOGY SOLUTIONS LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STASS, ADAM;YU, DUSTIN;REEL/FRAME:032694/0124

Effective date: 20130411

AS Assignment

Owner name: AYU TECHNOLOGY SOLUTIONS, LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:STASS, ADAM;REEL/FRAME:039355/0649

Effective date: 20160730

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: ALIVE TECHNOLOGIES, INC., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AYU TECHNOLOGY SOLUTIONS LLC;REEL/FRAME:047415/0743

Effective date: 20170308

AS Assignment

Owner name: ALIVE TECHNOLOGIES, INC., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ALIVE5, INC.;REEL/FRAME:047506/0558

Effective date: 20180712

Owner name: ALIVE5, INC., TEXAS

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE NAME OF ASSIGNEE PREVIOUSLY RECORDED ON REEL 047415 FRAME 0743. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:AYU TECHNOLOGY SOLUTIONS LLC;REEL/FRAME:047550/0594

Effective date: 20170308